2017. 2nd Issue
Full issue (5 MB)
The full papers are available only for subscribers - authentication required! / marked as
PAPERS FROM OPEN CALL
Dmitrii I. Popov and Sergey M. Smolskiy
Optimization of the digital rejection filter
The digital rejection filter (RF) is offered in the form of the device for substraction of weighted samples in the non-delayed channel and results of group accumulation of samples in the delayed channel. The RF optimization task is considered with the group sample accumulation in the delayed channel. The optimal relationships between RF parameters and correlation properties of interference are discussed, which corresponds to minimum of interference remainders. The influence of bit grid finiteness of the analog-to-digital converter (ADC) on effectiveness of interference rejection is studied. The expression is suggested for the minimal number of bits, which can be used for a choice of ADC type with account of given losses in effectiveness of interference rejection and required operation speed. The RF adaptation principles under condition of a priori uncertainty of interference correlation parameters are discussed. The analysis of the adaptive RF effectiveness is carried out depending on correlation properties of interference and the volume of the learning sample. From relations obtained, it follows that losses in effectiveness of interference rejection, which are caused by adaptation errors, can be restricted in advance by the given value by means of appropriate choice of the learning sample volume.
Csaba Simon, Miklós Máté, Markosz Maliosz and Norbert Bella
Ethernet with Time Sensitive Networking Tools for Industrial Networks
In currently deployed networks the time critical and/or real time traffic is sent over dedicated networks, requiring the operation of a separate infrastructure. This is especially true for Industrial Networks, which use technologies and protocols that are designed particularly for that purpose. The IEEE 802.1Q Time-Sensitive Networking (TSN) task group introduced a set of standards by defining QoS mechanisms, also known as TSN features, so that standard Ethernet networks could provide precise timing for critical flows. We have implemented two mature TSN features, frame preemption and time gated queuing, in a simulator, and on multiple network topologies we have evaluated the end-to-end delay and packet delay variation as the main QoS metrics and important design considerations in industrial networking setups. Our simulation results have shown that the QoS guarantees provided by TSN are strong enough for industrial use cases, but we have also identified some design and configuration pitfalls that TSN-adopters need to be cautious about.
Roland Király, Tamás Helfenbein, Sándor Király, Emőd Kovács and Tamás Balla
Novel concepts and devices in RFID based indoor localization using Smart Reader Networks and Intelligent Antennas
Industrial, logistic, and several other applications require the discovery, localization, and tracking of objects using existing passive radio frequency identification (RFID) based sys- tems. We have analysed system concepts, methods, and protocols to enhance accuracy and coverage of RFID localization systems in order to find a moving transponder in an area with high precision over time using reading parameters and also to estimate the location of the transponder with low error rate if the reading information is not available. This research is also focusing on the infrastructure requirements of determining or recovering the location or path of the tag. The extension of the RFID localization beyond the area covered by the RFID reader system could be a solution. This can be carried out by using a special device called "Nodding antenna" or by supplying the transponders and antennas with the information on how to determine or store their respective positions. Advantages and application areas of the Location-on-Tag (LoT) concept and a novel localization method based on intelligent antennas that can enhance reliability and robustness of indoor RFID localization systems and ensure inter- building tag path tracking are introduced in this paper.
CALL FOR PAPERS / PARTICIPATION
2017. 1st Issue
Full issue (7,4 MB)
PAPERS FROM OPEN CALL
Andras Kalmar and Rolland Vida
CAEsAR: Making the RPL Routing Protocol Context-Aware
Due to the continuous development in hardware-, radio-, and sensor technologies, and the efforts of standardization organizations, the Internet of Things is not just a vision anymore, but it slowly becomes a part of our everyday life. The number of deployed sensors and actuators in our environment is increasing day-by-day transforming the physical world into an intelligent environment enabling context-aware services. To fully support this transformation we need to adapt the basic principles of communication. We do not want to know the IP addresses of individual sensor for example, we would rather like to query them based on their context. Also, we are often interested in the information itself, no matter which device provides it.
In this paper we extend our formerly proposed addressing scheme for RPL networks (CAEsAR) to make it even more efficient. CAEsARv2 uses RPL trees and aggregates context information in Bloom-filters (BF) or bit vectors along the tree. With this addressing scheme the RPL protocol itself is enhanced to support context-based multicast, service-discovery and data- centric communication. Compared to our original proposal, in CAEsARv2 we get shorter update messages, as a result of assign- ing distinct data structures (Bloom filters or bit vectors) to each of the context parameters. We also show that by storing IP addresses also in Bloom filters, similarly to other context parameters, routing entries become shorter and evenly distributed among the nodes. Through simulations we demonstrate that the efficiency of Bloom-filter and bit vector aggregation in CAEsARv2 is not affected significantly by the radio ranges of the nodes in the network. Finally, through experimental results we show that, in case of correlation between geographical proximity and measured values, CAEsARv2 can adapt more efficiently to context changes than the centralized publish/subscribe messaging systems.
Oblivious Transfer with Verification
Although random sequences can be used to denerate probability events, they come with the risk of cheating in an unsupervised situation. In such cases, the oblivious transfer protocol may be used and this paper presents a variation to the DH key-exchange to serve as this protocol. A method to verify the correctness of the procedure, without revealing the random numbers used by two more parties, is also proposed.
PRACTICAL PAPERS OF APPLIED RESEARCH
Vlasta Stavova, Vashek Matyas, Mike Just and Martin Ukrop
Factors Influencing the Purchase of Security Software for Mobile Devices – Case Study
We investigated whether we could nudge users to purchase a premium version of mobile security software after using a trial version for 2-3 months. Our three interface designs used two persuasion methods: two decoy interfaces that attempted to nudge users to purchasing longer duration licenses, and one interface that used reciprocity in order to determine the value that people associated with the security software. We had approximately 60,000 participants for our study who completed a questionnaire, and again we had approximately 60,000 who were exposed to proposed variants. There were 12,000 participants who intersected both data samples, from which we also analyzed purchase decision patterns across our wide participant range, including users of English, German, Slovak, and Czech language versions. Our results indicate that factors such as gender, age, home country, and attitudes towards privacy and data sensitivity each had a significant impact on whether or not a premium license was purshased.
FROM IEEE COMMUNICATIONS MAGAZINE
Peter Rost, Albert Banchs, Ignacio Berberana, Markus Breitbach, Mark Doll, Heinz Droste, Christian Mannweiler, Miguel A. Puente, Konstantinos Samdanis and Bessem Sayadi
Mobile Network Architecture Evolution Toward 5G
As a chain is as strong as its weakest element, so are the efficiency, flexibility, and robustness of a mobile network, which relies on a range of different functional elements and mechanisms. Indeed, the mobile network architecture needs particular attention when discussing the evolution of 3GPP EPS because it is the architecture that integrates the many different future technologies into one mobile network. This article discusses 3GPP EPS mobile network evolution as a whole, analyzing specific architecture properties that are critical in future 3GPP EPS releases. In particular, this article discusses the evolution toward a "network of functions," network slicing, and software-defined mobile network control, management, and orchestration. Furthermore, the roadmap for the future evolution of 3GPP EPS and its technology components is detailed and relevant standards defining organizations are listed.
CALL FOR PAPERS / PARTICIPATION
IEEE SENSORS 2017, Glasgow, Scotland, UK
3th Cloudification of the Internet of Things 2017 - CloT 2017, Brussels, Belgium
IEEE International Conference on Microwaves, Communications, Antennas and Electronic Systems - IEEE COMCAS 2017, Tel Aviv, Israel
18th International Conference on System Design Languages of the SDL Forum Society - SDL Forum 2017, Budapest, Hungary